[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2046684.2046699acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Artificial intelligence and the future of cybersecurity

Published: 21 October 2011 Publication History

Abstract

A position paper toward an important and urgent discussion on how best use the potential of Artificial Intelligence in the context of cybersecurity. AI is often mentioned in papers on cybersecurity. But what is meant is using pre-existing AI techniques in cybersecurity. AI techniques are developed around applications. Cybersecurity has never been an area of concentration in AI. In this paper we argue that cybersecurity calls for new and specific AI techniques developed with that kind of application in mind. In practice, this paper is based on a broad overview of different approaches, which have the potential to be game changers in cybersecurity. This paper focuses on web application security and advocates the use of Knowledge Based Systems, probabilistic reasoning and Bayesian updating to control the probability of false positives and false negatives.

References

[1]
A. Barth, C. Jackson, and J. C. Mitchell. Robust Defenses for Cross-Site Request Forgery. In Proceedings of 15th ACM Conference, CCS,2008,
[2]
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, and Petko D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense. Syngress, 2007.
[3]
N. Jovanovic, E. Kirda, and C. Kruegel. Preventing Cross Site Request Forgery Attacks. Securecomm and Workshops, 2006, pages 1--10, Aug. 28 2006- Sept. 1 2006
[4]
Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and GiovanniVigna,: Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
[5]
Landwehr,Cal, Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water, IEEE, Security and privacy, September/October 2008, p.3
[6]
Bruce Schneier, On Security, 2008.
[7]
Douglas Corckford, Ajax Security, 2006.
[8]
http://www.w3.org/TR/access-control/
[9]
http://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet
[10]
Kenneth Ingham, Anil Somayaji, John Burge, Stephanie Forrest, Learning DFA representations of HTTP for protecting web applications Journal of Computer Networks. 51:5, pp. 1239--1255 (2007).
[11]
Darran Mutz, William Robertson, Giovanni Vigna, and Richard Kemmerer, Exploiting Execution Context for the Detection of Anomalous System Calls, Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast Australia, 2007
[12]
Marco Cova, Davide Balzarotti, Viktoria Felmetsger, and Giovanni Vigna Swaddler : An Approach for the Anomaly-based Detection of State Violations in Web Applications, Proceedings of the international Symposium on Recent Advances in Intrusion Detection (RAID), Gold Coast Australia, 2007
[13]
E. Kirdaa, N. Jovanovicb, C. Kruegelc, G. Vigna, Client-side cross-site scripting protection, Computers & Security, vol. 28, no.7, IOS Press 2009.
[14]
Marco Cova, Christopher Kruegel, and Giovanni Vigna, Detection and Analysis of Drive-by-Download Attacks and Malicious JavaScript Code, Proceedings of the World Wide Web Conference, Raleigh, NC, April 2010.
[15]
Robertson, Federico Maggi, Christopher Kruegel Giovanni Vigna, Effective Anomaly Detection with Scarce Training Data, Proceedings of the Network and Distributed System. Security Symposium (NDSS), San Diego, CA, February 010.
[16]
B. Morel, "Anomaly based intrusion detection systems", chapter in "intrusion detection systems, Intech (2011).
[17]
William Zeller and Edward W. Felten; Cross-Site Request Forgeries: Exploitation and Prevention, Princeton (2008); http://citp.princeton.edu/csrf/
[18]
L.J. Savage: The foundations of statistical inferences, 1962.
[19]
J. von Neumann, "Probabilistic logics and the synthesis of reliable organisms from unreliable components", in C. E. Shannon and J.McCarthy, editors, Annals of Math Studies, numbers 34, pages 43--98. Princeton Univ. Press, 1956
[20]
Scott Fahlman: "NETL, a System for Representing and Using real World Knowledge", MIT Press, Cambridge, MA, 1979
[21]
R. Akerkar, P.S. Sajja, Knowledge Based Systems, Jones and Bartlett, 2009.
[22]
Fahlman, S.E.: The Scone Knowledge Base (home page), http://www.cs.cmu.edu/~sef/ scone/
[23]
Blake Shepard et al. (2005). "A Knowledge-Based Approach to Network Security
[24]
http://www.w3.org/2004/OWL/
[25]
Judea Pearl. Probabilistic Reasoning in Intelligent systems: Networks of Plausible Inference. Morgan Kaufmann, San Mateo, CA, 1988.

Cited By

View all
  • (2024)The Impact of Quantum Computing on Post-Quantum Cryptography: Standardization And Migration StrategiesSSRN Electronic Journal10.2139/ssrn.4904933Online publication date: 2024
  • (2024)The Evolving Thread Landscape Pf Ai-Powered Cyberattacks:A Multi-Faceted Approach to Defense And Mitigate SSRN Electronic Journal10.2139/ssrn.4904878Online publication date: 2024
  • (2024)A survey on safeguarding critical infrastructures: Attacks, AI security, and future directionsInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2023.10064744(100647)Online publication date: Mar-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '11: Proceedings of the 4th ACM workshop on Security and artificial intelligence
October 2011
124 pages
ISBN:9781450310031
DOI:10.1145/2046684
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bayesian updating
  2. csrf
  3. probabilistic reasoning

Qualifiers

  • Short-paper

Conference

CCS'11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)551
  • Downloads (Last 6 weeks)22
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)The Impact of Quantum Computing on Post-Quantum Cryptography: Standardization And Migration StrategiesSSRN Electronic Journal10.2139/ssrn.4904933Online publication date: 2024
  • (2024)The Evolving Thread Landscape Pf Ai-Powered Cyberattacks:A Multi-Faceted Approach to Defense And Mitigate SSRN Electronic Journal10.2139/ssrn.4904878Online publication date: 2024
  • (2024)A survey on safeguarding critical infrastructures: Attacks, AI security, and future directionsInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2023.10064744(100647)Online publication date: Mar-2024
  • (2024)A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applicationsInternational Journal of Information Security10.1007/s10207-024-00868-223:4(2911-2938)Online publication date: 1-Aug-2024
  • (2024)The Future of AI in Predicting Cybersecurity ThreatsProceedings of the 5th International Conference on Data Science, Machine Learning and Applications; Volume 210.1007/978-981-97-8043-3_197(1382-1395)Online publication date: 20-Oct-2024
  • (2023)Intelligent Data Encryption Classifying Complex Security Breaches Using Machine Learning TechniqueEffective AI, Blockchain, and E-Governance Applications for Knowledge Discovery and Management10.4018/978-1-6684-9151-5.ch010(143-157)Online publication date: 30-Jun-2023
  • (2023)Human, Do You Think This Painting is the Work of a Real Artist?International Journal of Human–Computer Interaction10.1080/10447318.2023.223297840:18(5174-5191)Online publication date: 11-Jul-2023
  • (2023)Overview of Machine Learning Processes Used in Improving Security in API-Based Web ApplicationsArtificial Intelligence Application in Networks and Systems10.1007/978-3-031-35314-7_33(367-381)Online publication date: 9-Jul-2023
  • (2022)What managers of SMEs in the CEE region should know about challenges of artificial intelligence’s adoption? – an introductive discussionNowoczesne Systemy Zarządzania10.37055/nsz/14798917:1(63-76)Online publication date: 28-Mar-2022
  • (2022)Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature ReviewElectronics10.3390/electronics1102019811:2(198)Online publication date: 10-Jan-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media